CVE-2008-4129
 
Severity Score
4.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Gallery before 1.5.9, and 2.x before 2.2.6, does not properly handle ZIP archives containing symbolic links, which allows remote authenticated users to conduct directory traversal attacks and read arbitrary files via vectors related to the archive upload (aka zip upload) functionality.
Gallery, versiones anteriores a 1.5.9, y 2.x y versiones anteriores a 2.2.6, no trata adecuadamente archivos ZIP que contienen enlaces simbólicos, el cual permite a los usuarios remotos autentificados manejar los ataques de salto de directorio y leer archivos arbitrariamente a través de vectores relativos a el fichero cargado funcionalmente (alias zip cargado).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-09-18 CVE Reserved
- 2008-09-18 CVE Published
- 2024-08-07 CVE Updated
- 2024-09-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/31912 | Third Party Advisory | |
http://secunia.com/advisories/32662 | Third Party Advisory | |
http://secunia.com/advisories/33144 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45228 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://gallery.menalto.com/gallery_1.5.9_released | 2017-08-08 | |
http://gallery.menalto.com/gallery_2.2.6_released | 2017-08-08 | |
http://www.securityfocus.com/bid/31231 | 2017-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | <= 2.2.5 Search vendor "Gallery" for product "Gallery" and version " <= 2.2.5" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | 2.2.0 Search vendor "Gallery" for product "Gallery" and version "2.2.0" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | 2.2.1 Search vendor "Gallery" for product "Gallery" and version "2.2.1" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | 2.2.2 Search vendor "Gallery" for product "Gallery" and version "2.2.2" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | 2.2.3 Search vendor "Gallery" for product "Gallery" and version "2.2.3" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | 2.2.4 Search vendor "Gallery" for product "Gallery" and version "2.2.4" | - |
Affected
| ||||||
Gallery Search vendor "Gallery" | Gallery Search vendor "Gallery" for product "Gallery" | <= 1.5.8 Search vendor "Gallery" for product "Gallery" and version " <= 1.5.8" | - |
Affected
|